Dropped Files | ZeroBOX
Name e9f11a132b36581c_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2596 (WINWORD.EXE)
Type data
MD5 8e7224228ae4194fddfed35e95b5465b
SHA1 b6c896ba3c2ebffb9d5941fe83a68dd11df6cd4a
SHA256 e9f11a132b36581cd146e55975ee543e2d9783fc84c2c18d8ded5f57d73aef89
CRC32 B44E46AB
ssdeep 3:yW2lWRdvL7YMlbK7lpnX:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis
Name a95537d87097fd11_~$tracted_at_0x20c7e.rtf
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$tracted_at_0x20c7e.rtf
Size 162.0B
Processes 2596 (WINWORD.EXE)
Type data
MD5 4a63619709c865481fa9e1c883f87681
SHA1 bb06b4cb6cafedb5bf8ad01d8664d8176f81efdb
SHA256 a95537d87097fd11fcf6f29d23cd6326861064a14f8f157442281038e762592d
CRC32 1D05333E
ssdeep 3:yW2lWRdvL7YMlbK7lhZxngnlZn:y1lWnlxK7Rxnil
Yara None matched
VirusTotal Search for analysis
Name 28790cfcf37159ea_~wrs{6cd57c96-2df8-4904-a0d8-8568c704ecc4}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{6CD57C96-2DF8-4904-A0D8-8568C704ECC4}.tmp
Size 24.0B
Processes 2596 (WINWORD.EXE)
Type data
MD5 0a40d2505a76078a466d2730e3ddc321
SHA1 e7ea41680123c3c6a0733fe8b101aa41f3a18f2f
SHA256 28790cfcf37159ea9c9323e08e017f0d752f44513a0001b08968c8792ccf1746
CRC32 FD96DF59
ssdeep 3:elmKlAFLQfl:efxN
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{d1419103-8e08-4035-9d15-b7af70823e77}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D1419103-8E08-4035-9D15-B7AF70823E77}.tmp
Size 1.0KB
Processes 2596 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis